CN106843853A - The method and apparatus for protecting user profile - Google Patents
The method and apparatus for protecting user profile Download PDFInfo
- Publication number
- CN106843853A CN106843853A CN201611239459.2A CN201611239459A CN106843853A CN 106843853 A CN106843853 A CN 106843853A CN 201611239459 A CN201611239459 A CN 201611239459A CN 106843853 A CN106843853 A CN 106843853A
- Authority
- CN
- China
- Prior art keywords
- files
- default checking
- checking information
- app
- current authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012545 processing Methods 0.000 claims description 7
- 230000003993 interaction Effects 0.000 abstract description 6
- 230000000694 effects Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/31—Programming languages or programming paradigms
- G06F8/315—Object-oriented languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Abstract
The present invention provides a kind of method and apparatus for protecting user profile; stored in SO files by by default checking information; before APP and server carry out data interaction; APP ends obtain current authentication information; determine whether checking information is consistent with the presupposed information in SO files; if current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned.If current authentication information is inconsistent with default checking information in SO files, null value is returned;Due to default checking information is encapsulated in SO files, increases and crack difficulty, therefore, cracker cannot obtain default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.
Description
Technical field
The present invention relates to computer technology, more particularly to a kind of method and apparatus for protecting user profile.
Background technology
Along with developing rapidly for mobile phone application, application program (Application, abbreviation of electronic equipment:APP) also obtain
Extensive use is arrived.APP independent operatings in the electronic device, data interaction is carried out by with background server, realizes the work(of APP
Energy.
In correlation technique, when APP sends network request to server, network request is encrypted using public key, serviced
Device is decrypted by the network request after private key pair encryption, the validity of the parameter transmitted in verification network request.
However, using the method for prior art, if application program is by decompiling, it is easy to which be cracked out public key, cracks
Person by forge public key to background server circulate initiate network request, Brute Force user profile, therefore, use in the prior art
The security of family information is not high.
The content of the invention
The present invention provides a kind of method and apparatus for protecting user profile, to improve the security of user profile.
One aspect of the invention provides a kind of method for protecting user profile, including:
Obtain current authentication information;
Judge whether current authentication information is consistent with the default checking information in shared component SO files;
If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;
If current authentication information is inconsistent with default checking information in SO files, null value is returned.
Alternatively, the method also includes:
Network request is sent to server.
Alternatively, before judging whether current authentication information is consistent with the default checking information in SO files, also include:
Obtain default checking information;
It is encapsulated into the code that C language or C Plus Plus are realized, default checking information according to code building SO files;
By the storage of SO files in application APP.
Alternatively, default checking information includes:The public key of APP and/or the signature file of APP.
Alternatively, presetting checking information includes the public key of APP;
Be encapsulated into the code that C language or C Plus Plus are realized default checking information, according to code building SO by method
Before file, also include:
Consult APP public keys with server.
Another aspect of the invention provides a kind of device of protection user profile, including:
Acquisition module, for obtaining current authentication information;
Processing module, for judge current authentication information whether with shared component SO files in default checking information one
Cause;If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;If current authentication information
It is inconsistent with default checking information in SO files, then return to null value.
Alternatively, the device also includes:
Sending module, for sending network request to server.
Alternatively, acquisition module is additionally operable to obtain default checking information;
Processing module is additionally operable to default checking information, is encapsulated into the code that C language or C Plus Plus are realized, according to
Code building SO files;By the storage of SO files in application APP.
Alternatively, default checking information includes:The public key of APP and/or the signature file of APP.
Alternatively, presetting checking information includes the public key of APP;
Acquisition module is additionally operable to consult APP public keys with server.
The method and apparatus of the protection user profile that the present invention is provided, store in SO files by by default checking information
In, before APP and server carry out data interaction, APP ends obtain current authentication information, determine whether checking information is literary with SO
Presupposed information in part is consistent, if current authentication information is consistent with the default checking information in SO files, returns to encrypted word
Symbol string.If current authentication information is inconsistent with default checking information in SO files, null value is returned;Due to default checking being believed
Breath is encapsulated in SO files, is increased and is cracked difficulty, therefore, cracker cannot obtain default checking information, and then, it is impossible to simulate
Network request, so that, user profile is protected, improve the security of user profile.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also
Other accompanying drawings are obtained with according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the embodiment of the method one of present invention protection user profile;
Fig. 2 is the schematic flow sheet of the embodiment of the method two of present invention protection user profile;
Fig. 3 is the schematic flow sheet of the embodiment of the method three of present invention protection user profile;
Fig. 4 is the structural representation of the device embodiment one of present invention protection user profile.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in description and claims of this specification and above-mentioned accompanying drawing
Four " etc. (if present) is for distinguishing similar object, without for describing specific order or precedence.Should manage
Solution so data for using can be exchanged in the appropriate case, so that embodiments of the invention described herein for example can be removing
Order beyond those for illustrating herein or describing is implemented.Additionally, term " comprising " and " having " and theirs is any
Deformation, it is intended that covering is non-exclusive to be included, for example, containing process, method, system, the product of series of steps or unit
Product or equipment are not necessarily limited to those steps clearly listed or unit, but may include not list clearly or for this
A little processes, method, product or other intrinsic steps of equipment or unit.
The present invention is stored in shared component (Share Obiect, abbreviation by by default checking information:SO) in file,
Before APP carries out data interaction with server, APP ends are first verified to current authentication information, specifically, obtain current authentication
Information, determines whether checking information is consistent with the presupposed information in SO files, if pre- in current authentication information and SO files
If checking information is consistent, then encrypted characters string is returned.If current authentication information is inconsistent with default checking information in SO files,
Then return to null value;Due to default checking information is encapsulated in SO files, increases and crack difficulty, therefore, cracker cannot obtain
To default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.
Technical scheme is described in detail with specifically embodiment below.These specific implementations below
Example can be combined with each other, and may be repeated no more in some embodiments for same or analogous concept or process.
Fig. 1 is the schematic flow sheet of the embodiment of the method one of present invention protection user profile, and the present embodiment is held by APP ends
OK, the method for the present embodiment is as follows:
S101:Obtain current authentication information.
Wherein, account of the current authentication information generally with APP is uniquely corresponding, for example:Can be public key, the label of APP of APP
Name file or other information.
S102:Judge whether current authentication information is consistent with the default checking information in shared component SO files;If so, then
S103 is performed, if it is not, then performing S104.
Wherein, default checking information is included but is not limited to:The public key of APP and/or the signature file of APP.
Wherein, the public key of APP is used to be encrypted the network request sent to server.
The signature file of APP, this document compiling generation in packing, it is unique and can not repeat, it can be ensured that APP is only
One property.
When the default checking information in judging current authentication information and SO files is consistent, then S103 is performed.When judgement is worked as
When default checking information in preceding checking information and SO files is inconsistent, the sender for illustrating current authentication information should be illegal
User, then perform S104.
S103:Return to encrypted characters string.
S104:Return to null value.
S105:Encrypted characters string is sent to server.
Server is decrypted by private key pair encryption character string, but is verified, return responds to APP ends.
For example:
Wherein, one example of the public key of APP is as follows:
“MIICdwIBADANBgkqhksdfsfsdfsiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMWRKAbbwylnEesVEi+
XxIU7D0zjaxeUjkZdavJCIv6xFLumM6MkvAxeo4nXtrCdM/
In1ogbfUBEKiWl7HxmcRbWrjl0uso7A4SxwZhgynCxdfsH4cXQqt61GaLmbzIEvD8H1BazNCwerwe
rewrsdfhPDHdswkxKo0sdfsdfjrEuRh2h7+
mfdsf9fcQPAgMBAAECgYEAv9F1eWM5kyM9ZG9q3saNyYVUD6TmP1i+4lalFV1dOMeZh6+Qhx+
NbL0eLyE/gS7AVqaTRkbaTuFfwnnsdfsdWi4757TY7QMdLHPN0LGeWDSA+/+
UjkT8m4QyTAHV3hUjQd519swo1GuuzLhCFhoYV+
gW0kvWP3Ksdfasfcbyi17yedBpmECQQDq4n0DvD0isf76rotwxDo7OsRrbEsdfasfwerfXgxlQLsf
sfsfsdfshMB/CG7bcmq3hZDbQ4sxzCqu2FQDBE8Mk5AsfkEA11PbucHT+0/
Jy2sfSSG7BfwQ6Iy1hwRGiV/WLJIrL4ycdwdGFeNdzCV2ekCj1cb/
cxTifL1Cdm9elWiSVBPfhwJBAMEOS0aIr49JgiYoXbIymPkeXhbmhTC9cvao8zYhAAPgb/
sdfsfsfs/DGxw5pJQwY0c7A6S2IeTb5Oo0PLFAsIZr0Epuje9FOEqkCQEvq16L0Q/
AvY4m8PPikscYrCOsD05sL6jnPQJKNbXO+CwKgZe52VhG0Ze1Ru2dEKlJJLjym9GVLBm2CpMtaxFg
="
Message Digest Algorithm 5 (Message Digest Algorithm, referred to as:MD5) as a example by certificate, following institute
Show:
“DC6DBD6E49682A57A8B82889043B93A8”
The present embodiment, stores in SO files by by default checking information, APP and server carry out data interaction it
Before, APP ends obtain current authentication information, determine whether checking information is consistent with the presupposed information in SO files, if currently tested
Card information is consistent with the default checking information in SO files, then return to encrypted characters string.If in current authentication information and SO files
Default checking information it is inconsistent, then return to null value;Due to default checking information is encapsulated in SO files, increases and crack difficulty
Degree, therefore, cracker cannot obtain default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, carry
The security of user profile high.
Fig. 2 is the schematic flow sheet of the embodiment of the method two of present invention protection user profile, and Fig. 2 is being implemented shown in Fig. 1
On the basis of example, further, before S102, also include:
S1001:Obtain default checking information.
Default checking information includes but is not limited to following at least one:
The signature file of APP public keys and APP.
S1002:It is encapsulated into the code that C language or C Plus Plus are realized, default checking information according to code building
SO files.
Wherein, a kind of possible implementation is:
Write the code that C voices or C Plus Plus are realized, realization judge current authentication information whether with code in preset
The consistent logic of checking information, if unanimously, being carried out to network request according to part or full detail in default checking information
Encryption, generates encrypted characters string.Using Java local interfaces (Java Native Interface, abbreviation:JNI) feature, uses
Native language kit (native development kit, referred to as:NDK), by Android.mk files, by C language or
The language that person's C Plus Plus written in code can be recognized into JAVA, ultimately generates SO files.
Wherein, the difference of the CPU models that SO files can be in the operating system of electronic equipment, can be divided into a lot
Kind, for example:" armeabi-v7a " etc., because of its backward compatible characteristic, it is only necessary to be placed under armeabi files.
S1003:By the storage of SO files in application APP.
Wherein, a kind of possible implementation is to store in specified catalogue, such as android engineerings SO files
Under " main/jinLibs/armeabi " file, the catalogue is typically the catalogue that android engineerings are specified.The SO files can be with
Loaded by JAVA codes.
The present embodiment, by obtaining default checking information, by default checking information, is encapsulated into C language or C Plus Plus reality
In existing code, according to code building SO files, by the storage of SO files in application APP.So as to realize default checking
Information is stored in APP in the form of binary file, is increased and is cracked difficulty, therefore, cracker cannot obtain default checking
Information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.
Fig. 3 is the schematic flow sheet of the embodiment of the method three of present invention protection user profile, and Fig. 3 is being implemented shown in Fig. 2
On the basis of example, when the public key of APP is included in default checking information, before S1001, also include:
S1000:APP consults APP public keys with server.
APP consults APP public keys in advance with server, the request encryption for APP ends to being sent to server;The public key
APP and server each preserve portion, and server again in addition more stores a private keys, for the encrypted characters string sent to APP
It is decrypted.
The present embodiment, by way of APP and server consult, determines APP public keys, is carried out with server in order to APP
It is encrypted during data interaction, improves the security of user profile.
Fig. 4 is the structural representation of the device embodiment one of present invention protection user profile, and the device of the present embodiment includes:
Acquisition module 401 and processing module 402, wherein,
Acquisition module 401 is used to obtain current authentication information;
Processing module 402 be used for judge current authentication information whether with shared component SO files in default checking information one
Cause;If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;If current authentication information
It is inconsistent with default checking information in SO files, then return to null value.
Wherein, default checking information includes:The public key of APP and/or the signature file of APP.
In fig. 4, can also include:Sending module 403 is used to send network request to server.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 1, its realization principle and technology
Effect is similar to, and here is omitted.
On the basis of the device embodiment one of protection user profile, the device reality of the protection user profile that the present invention is provided
Apply in example two, acquisition module 401 is additionally operable to obtain default checking information;Processing module 402 is additionally operable to default checking information, envelope
It is attached in the code that C language or C Plus Plus are realized, according to code building SO files;By the storage of SO files in application APP
In.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 2, its realization principle and technology
Effect is similar to, and here is omitted.
On the basis of the device embodiment one of protection user profile, the device reality of the protection user profile that the present invention is provided
Apply in example two, presetting checking information includes the public key of APP;Acquisition module 401 is additionally operable to consult APP public keys with server.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 3, its realization principle and technology
Effect is similar to, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to
The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey
Sequence upon execution, performs the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered
Row equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
1. it is a kind of protect user profile method, it is characterised in that including:
Obtain current authentication information;
Judge whether the current authentication information is consistent with the default checking information in shared component SO files;
If the current authentication information is consistent with the default checking information in the SO files, encrypted characters string is returned;
If the current authentication information is inconsistent with default checking information in the SO files, null value is returned.
2. method according to claim 1, it is characterised in that also include:
The encrypted characters string is sent to server.
3. method according to claim 2, it is characterised in that it is described judge the current authentication information whether with SO files
In default checking information it is consistent before, also include:
Obtain the default checking information;
It is encapsulated into the code that C language or C Plus Plus are realized, the default checking information according to the code building SO
File;
By SO files storage in application APP.
4. method according to claim 3, it is characterised in that the default checking information includes:The public key of APP and/or
The signature file of the APP.
5. method according to claim 4, it is characterised in that the default checking information includes the public key of APP;
Be encapsulated into the code that C language or C Plus Plus are realized the default checking information, according to the generation by methods described
Before code generation SO files, also include:
Consult the APP public keys with the server.
6. it is a kind of protect user profile device, it is characterised in that including:
Acquisition module, for obtaining current authentication information;
Processing module, for judge the current authentication information whether with shared component SO files in default checking information one
Cause;If the current authentication information is consistent with the default checking information in the SO files, encrypted characters string is returned;If described
Current authentication information is inconsistent with default checking information in the SO files, then return to null value.
7. device according to claim 6, it is characterised in that also include:
Sending module, for sending the network request to server.
8. device according to claim 7, it is characterised in that the acquisition module is additionally operable to obtain the default checking letter
Breath;
The processing module is additionally operable to the default checking information, is encapsulated into the code that C language or C Plus Plus are realized,
According to the code building SO files;By SO files storage in application APP.
9. device according to claim 8, it is characterised in that the default checking information includes:The public key of APP and/or
The signature file of the APP.
10. device according to claim 9, it is characterised in that the default checking information includes the public key of APP;
The acquisition module is additionally operable to consult the APP public keys with the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611239459.2A CN106843853B (en) | 2016-12-28 | 2016-12-28 | Method and device for protecting user information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611239459.2A CN106843853B (en) | 2016-12-28 | 2016-12-28 | Method and device for protecting user information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106843853A true CN106843853A (en) | 2017-06-13 |
CN106843853B CN106843853B (en) | 2020-09-08 |
Family
ID=59114043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611239459.2A Active CN106843853B (en) | 2016-12-28 | 2016-12-28 | Method and device for protecting user information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106843853B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109474617A (en) * | 2018-12-17 | 2019-03-15 | 武汉斗鱼鱼乐网络科技有限公司 | Call method, device, terminal and the storage medium of function in a kind of SO file |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1832398A (en) * | 2006-04-14 | 2006-09-13 | 中国软件与技术服务股份有限公司 | Method and system of file encipher share |
US20140019765A1 (en) * | 2011-01-07 | 2014-01-16 | Thomson Licensing | Device and method for online storage, transmission device and method, and receiving device and method |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
CN104615933A (en) * | 2015-01-27 | 2015-05-13 | 北京奇虎科技有限公司 | Method for preventing software decompilation and method and device for preventing decompilation software from starting |
CN104903909A (en) * | 2013-03-15 | 2015-09-09 | 甲骨文国际公司 | Intra-computer protected communications between applications |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN106230598A (en) * | 2016-07-29 | 2016-12-14 | 深圳兆日科技股份有限公司 | Mobile terminal third-party application safety certifying method and device |
-
2016
- 2016-12-28 CN CN201611239459.2A patent/CN106843853B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1832398A (en) * | 2006-04-14 | 2006-09-13 | 中国软件与技术服务股份有限公司 | Method and system of file encipher share |
US20140019765A1 (en) * | 2011-01-07 | 2014-01-16 | Thomson Licensing | Device and method for online storage, transmission device and method, and receiving device and method |
CN104903909A (en) * | 2013-03-15 | 2015-09-09 | 甲骨文国际公司 | Intra-computer protected communications between applications |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
CN104615933A (en) * | 2015-01-27 | 2015-05-13 | 北京奇虎科技有限公司 | Method for preventing software decompilation and method and device for preventing decompilation software from starting |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN106230598A (en) * | 2016-07-29 | 2016-12-14 | 深圳兆日科技股份有限公司 | Mobile terminal third-party application safety certifying method and device |
Non-Patent Citations (1)
Title |
---|
远方夕阳: "android so 文件存私密数据,且防止 so文件未知应用盗用", 《HTTPS://BLOG.CSDN.NET/XX753277/ARTICLE/DETAILS/37567951》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109474617A (en) * | 2018-12-17 | 2019-03-15 | 武汉斗鱼鱼乐网络科技有限公司 | Call method, device, terminal and the storage medium of function in a kind of SO file |
CN109474617B (en) * | 2018-12-17 | 2021-07-23 | 武汉斗鱼鱼乐网络科技有限公司 | Method, device, terminal and storage medium for calling functions in SO file |
Also Published As
Publication number | Publication date |
---|---|
CN106843853B (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
CN107430658B (en) | Security software certification and verifying | |
CN107743115B (en) | Identity authentication method, device and system for terminal application | |
CN107659632A (en) | A kind of file encryption-decryption method, device and computer-readable recording medium | |
CN105812366B (en) | Server, anti-crawler system and anti-crawler verification method | |
CN106656513B (en) | The secondary packing signature verification method of APK file on Android platform | |
CN104636444B (en) | A kind of encryption and decryption method and device of database | |
CN105340211A (en) | System and methods for encrypting data | |
CN109284585B (en) | Script encryption method, script decryption operation method and related device | |
CN106452786A (en) | Encryption and decryption processing method, apparatus and device | |
CN111475824A (en) | Data access method, device, equipment and storage medium | |
CN108229144B (en) | Verification method of application program, terminal equipment and storage medium | |
CN101894232B (en) | Safe input method applied to identity authentication | |
CN109660353A (en) | A kind of application program installation method and device | |
CN106897761A (en) | A kind of two-dimensional code generation method and device | |
CN111143877B (en) | Python-based wind and light prediction algorithm file encryption method and device | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN114547558A (en) | Authorization method, authorization control method and device, equipment and medium | |
KR20110072111A (en) | Method and system for preventing outflow in software source code | |
CN114626079A (en) | File viewing method, device, equipment and storage medium based on user permission | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
JP4998314B2 (en) | Communication control method and communication control program | |
US20110145568A1 (en) | Handling of the usage of software in a disconnected computing environment | |
CN106843853A (en) | The method and apparatus for protecting user profile | |
CN103813321A (en) | Agreement key based data processing method and mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |